


default search action
6th ACIS-ICIS 2007: Melbourne, Australia
- 6th Annual IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007), 11-13 July 2007, Melbourne, Australia. IEEE Computer Society 2007, ISBN 0-7695-2841-4
Keynote Address
- Kate Smith-Miles:
Meta-Learning: From Classification to Forecasting, to Optimization, and Beyond. 2
Computer Science and Information Science
- Tsung-Yu Liu, Tan-Hsu Tan, Yu-Ling Chu:
2D Barcode and Augmented Reality Supported English Learning System. 5-10 - Abdusalam F. A. Nwesri, Seyed M. M. Tahaghoghi, Falk Scholer
:
Answering English Queries in Automatically Transcribed Arabic Speech. 11-16 - Gerhard Visser, David L. Dowe:
Minimum Message Length Clustering of Spatially-Correlated Data with Varying Inter-Class Penalties. 17-22 - Cynthia Y. Lester:
Growing the Pipeline: Restructuring an Introductory Computer Programming Course. 23-28 - Luke Bellamy, Damien Hutchinson, Jason Wells:
User Perceptions and Acceptance of Benevolent Worms -- A Matter of Fear? 29-36
Computer Architecture and VLSI
- Chien-Chuan Ko, Bo-Zhi Yang:
An Integrated Technique for Video Watermarking. 37-42 - Gin-Der Wu, Zhen-Wei Zhu:
Chip Design of LPC-cepstrum for Speech Recognition. 43-47 - Cong-Kha Pham
:
CMOS Schmitt Trigger Circuit with Controllable Hysteresis Using Logical Threshold Voltage Control Circuit. 48-53 - C. Y. Ho, Anthony Shi-Sheung Fong:
Combining Local and Global History Hashing in Perceptron Branch Prediction. 54-59 - Md. Mafijul Islam:
On the Limitations of Compilers to Exploit Thread-Level Parallelism in Embedded Applications. 60-66
Web Engineering and Applications
- Indra Seher, Athula Ginige
, Seyed A. Shahrestani
:
A Domain Identification Algorithm for Personalised Query Expansion with Contextual Information. 67-72 - Robert L. R. Mattson, Somnath Ghosh:
A performance analysis of page and object retrieval using HTTP-MPLEX in symmetric network environments. 73-80 - Kenneth Patrick Payne, Joarder Kamruzzaman:
Service Oriented Architecture for Legal Web Portal. 81-86 - Zakaria Maamar, Djamal Benslimane, Quan Z. Sheng
:
Towards A Two-Layered Framework for Managing Web Services Interaction. 87-92 - Manish Chhabra
, Hongen Lu:
Towards Agent Based Web Service. 93-99
Image Processing and Pattern Recognition I
- Gita Das, Sid Ray:
A Comparison of Relevance Feedback Strategies in CBIR. 100-105 - Ranadhir Ghosh, Moumita Ghosh, John Yearwood, Subhasis Mukherjee:
A fully Automated CAD system using Multi-category Feature Selection with Restricted Recombination. 106-111 - Andrew Skabar, Narendra Juneja:
A Kernel-Based Method for Semi-Supervised Learning. 112-117 - Jan Carlo Barca, Grace W. Rumantir:
A Modified K-means Algorithm for Noise Reduction in Optical Motion Capture Data. 118-122 - Yao-Hong Tsai:
A New Approach for Image Thresholding under Uneven Lighting Conditions. 123-127 - Abbas Golestani, Kushan Ahmadian, Ali Amiri, Mohammad Reza Jahed-Motlagh:
A Novel Adaptive-Boost-Based Strategy for Combining Classifiers Using Diversity Concept. 128-134
Mobile/Wireless Computing I
- Yong Qi, Min Xi, Saiyu Qi, Jizhong Zhao:
A Conflict Resolution Method in Context-Aware Computing. 135-140 - Babak Pazand, Chris McDonald:
A Critique of Mobility Models for Wireless Network Simulation. 141-146 - Kemeng Yang, Iqbal Gondal
, Bin Qiu, Laurence S. Dooley:
A Fuzzy Adaptive Soft Handover Scheme Supporting Four Active Sets. 147-152 - Zhitang Li, Shudong Shi:
A Secure Routing Protocol for Mobile Ad hoc Networks. 153-157 - Henry Larkin:
Applying Concurrent Versioning to Serverless Mobile Device Synchronisation. 157-162 - Guo Fang Mao, Alex Talevski, Elizabeth Chang
:
Voice over Internet Protocol on Mobile Devices. 163-169
Computer, Software Engineering and Information Engineering I
- Dussadee Praserttitipong, Peraphon Sophatsathit
:
A Framework for Deterministic Intention Specifications of an Agent toward an Incomplete Declared Intention. 170-175 - Shaochun Xu, Zendi Cui, Yufeng Gui:
Cognitive Process during Incremental Software Development. 176-181 - Phamorn Vantakavikran, Nakornthip Prompoon:
Constructing a Process Model for Decision Analysis and Resolution on COTS Selection Issue of Capability Maturity Model Integration. 182-187 - Tien N. Nguyen:
Integration of Configuration Management and Hypermedia for Managing Changes in Database Applications. 188-193 - Jinalben Patel, Roger Y. Lee, Haeng-Kon Kim:
Architectural View in Software Development Life-Cycle Practices. 194-199 - Eun-Ju Park, Haeng-Kon Kim, Roger Y. Lee:
Frameworks of Integration Repository for Software Process Improvement using SOA. 200-206
Image Processing and Pattern Recognition II
- Jun Li, Hong Peng, Zheng Pei:
Adaptive Watermarking Algorithm Using SVR in Wavelet Domain. 207-211 - Ferdous Ahmed Sohel
, Gour C. Karmakar, Laurence S. Dooley:
Bezier Curve-Based Character Descriptor Considering Shape Information. 212-216 - Kushan Ahmadian, Abbas Golestani, Morteza Analoui
, Mohammad R. Jahed:
Evolving Ensemble of Classifiers In Low-Dimensional Spaces Using Multi-Objective Evolutionary Approach. 217-222 - Chensheng Sun, Kin-Man Lam
:
The GVF Snake with a Minimal Path Approach. 223-228 - Morshed U. Chowdhury
, Rezwanur Rahman, Joydip Saha, S. M. Raiyan Kabir:
Fast Scene Change Detection Based Histogram. 229-233 - Aliaa A. A. Youssif
, Morshed U. Chowdhury
, Sid Ray, Howida Youssry Nafaa:
Fingerprint Recognition System Using Hybrid Matching Techniques. 234-240
Mobile/Wireless Computing II
- Mike Tyson, Carlo Kopp:
Defining Functional Requirements for a Lightweight GNSS Support Protocol (LGSP). 241-246 - Ping Han, Yanqin Zhu, Yuemei Hu:
Design of Multi-signature Scheme in Wireless Networks. 247-251 - David Kang, Wei Dai:
Development of Multimodal Ubiquitous System: A pilot study. 252-256 - Suhaimi Bin Abd Latif, Mohammed A. Rashid
, Fakhrul Alam
:
Effects of Varying Superframe Duration on Jitter in Interactive Multimedia Traffic Transmission over WLANs. 257-260 - Anies Hannawati Purnamadjaja, Johan Iskandar, R. Andrew Russell:
Pheromone Communication Simulation for Mobile Robots Using Java 3D. 261-266 - Nariaki Kato, Naohiro Ishii:
Cell Phone System for Tour & Information Guide. 267-273
Computer, Software Engineering, and Information Engineering II
- Shirantha Wijesekera, Sajal Palit, Bala Balachandran:
Software Development for B92 Quantum Key Distribution Communication Protocol. 274-278 - Yang Xu, Shengqun Tang, Youwei Xu, Zukai Tang:
Towards Aspect Oriented Web Service Composition with UML. 279-284 - Giuseppe Vella
, Nunzio Ingraffia, Marilia Liotta, Antonella Santangelo, Antonio Gentile:
XPL, a Presentation Language based on User Interface Design Pattern. 285-290 - Alauddin Ahmed
, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury
:
A Comparison of Bipartite N-Qubit States to Classify Entangled States under Symmetric Consideration. 291-295 - Lianzhang Zhu, Yanchen Li:
Reliability Analysis of Component Software Based on Stochastic Petri Nets. 296-301 - Theodore Van Toll III, Roger Y. Lee, Tom Ahlswede:
Evaluating the Usefulness of Pair Programming in a Classroom Setting. 302-308
Image Processing and Pattern Recognition III
- Madasu Hanmandlu, A. V. Nath, A. C. Mishra, Vamsi Krishna Madasu:
Fuzzy Model Based Recognition of Handwritten Hindi Numerals using Bacterial Foraging. 309-314 - Gin-Der Wu, Pang-Hsuan Huang:
Image Watermarking Using Structure Based Wavelet Tree Quantization. 315-319 - Manoranjan Paul
, M. Manzur Murshed
:
Impact of Clustering Techniques on Content-Based Pattern Generation Algorithm for Low Bit Rate Video Coding. 320-325 - Ross Eldridge, Heiko Rudolph, Jonathan Duckworth
, Peter H. Wilson
:
Improved Background Removal through Polarisation in Vision-Based Tabletop Interface. 326-331 - Tam Phuong Cao, Darrell M. Elton, John C. Devlin:
Real-time Linear Projection Speed Sign Detection System in Low Light Conditions. 332-338 - Luke Domanski:
Slice and Blockwise Well-Composed Sets. 339-345
Mobile/Wireless Computing III
- Yiling Wang, Phu Dung Le, Balasubramaniam Srinivasan:
Hybrid Group Key Management Scheme for Secure Wireless Multicast. 346-351 - Jing He
, Yanchun Zhang, Guangyan Huang, Yong Shi:
Network Lifetime of Application-Specific Randomly Deployed Wireless Sensor Networks in Arbitrary Sensor Density. 352-357 - Md. Mahbubur Rahman, Md. Delowar Hossain
, A. B. M. Shawkat Ali
:
Performance Analysis of OFDM Systems with Phase Noise. 358-362 - Belal Chowdhury, Rajiv Khosla:
RFID-based Hospital Real-time Patient Management System. 363-368 - Ahadur Rahaman, Jemal H. Abawajy, Michael Hobbs
:
Taxonomy and Survey of Location Management Systems. 369-374 - Shawn Haggett, Greg Knowles, Graham Bignell:
Tokenisation of Class Files for an Embedded Java Processor. 375-381
Knowledge Discovery, Artificial Intelligence, Neural Networks, and Genetic Algorithms I
- Abu Saleh Shah Muhammad Barkat Ullah
, Ruhul A. Sarker
, David Cornforth:
A Combined MA-GA Approach for Solving Constrained Optimization Problems. 382-387 - Mahmoud Tarokh:
A Genetic Robot Path Planner with Fuzzy Logic Adaptation. 388-393 - Bager Zarei
, Mohammad Reza Meybodi, Mortaza Abbaszadeh Meinagh
:
A Hybrid Method for Solving Traveling Salesman Problem. 394-399 - Mauritsius Tuga
, Regina Berretta
, Alexandre Mendes
:
A Hybrid Simulated Annealing with Kempe Chain Neighborhood for the University Timetabling Problem. 400-405 - Mohamed Shaarawy, Mohamed Belal, Ehab ElGindy:
A Neuro-Fuzzy Model for Motion Cognition. 406-411 - Megan Woods, Iqbal Gondal
:
A Procedural Approach to Forecasting Nocturnal Air Temperature for Frost Prediction. 412-418
Image, Acoustic, Speech, and Signal Processing I
- Jia Rong
, Yi-Ping Phoebe Chen
, Morshed U. Chowdhury
, Gang Li
:
Acoustic Features Extraction for Emotion Recognition. 419-424 - Mieng Quoc Phu, Peter E. Tischer, Hon Ren Wu
:
Statistical Analysis of Impulse Noise Model for Color Image Restoration. 425-431 - Prashan Premaratne
, Farzad Safaei
:
2D Barcodes as Watermarks in Image Authentication. 432-437 - Md. Shamsul Huda, John Yearwood, Ranadhir Ghosh:
A Hybrid Algorithm for Estimation of the Parameters of Hidden Markov Model based Acoustic Modeling of Speech Signals using Constraint-Based Genetic Algorithm and Expectation Maximization. 438-443 - Carol Pedersen, Joachim Diederich:
Accent Classification Using Support Vector Machines. 444-449 - Cheng-Hsiung Hsieh, Ren-Hsien Huang, Ting-Yu Feng:
One-Dimensional Grey Polynomial Interpolators for Image Enlargement. 450-456
Intelligent Agent Technology, Agent Based Systems
- Fenghui Ren
, Minjie Zhang
, Quan Bai
:
A Fuzzy-Based Approach for Partner Selection in Multi-Agent Systems. 457-462 - Ickjai Lee
, Bayani Portier:
An Empirical Study of Knowledge Representation and Learning within Conceptual Spaces for Intelligent Agents. 463-468 - Paola Flocchini, Amiya Nayak
, Arno Schulz:
Decontamination of Arbitrary Networks using a Team of Mobile Agents with Limited Visibility. 469-474 - Eduardo Rodrigues Gomes, Ryszard Kowalczyk
:
Learning in Market-based Resource Allocation. 475-482 - Sarmad Sadik, Arshad Ali
, Hafiz Farooq Ahmad
, Hiroki Suguri:
Policy based Ontology Framework for Mobile Agents. 483-488 - Neeraj Kumar Nehra, R. B. Patel, Vijay Kumar Bhat
:
Routing with Load Balancing in Ad Hoc Network: A Mobile Agent Approach. 489-495
Knowledge Discovery, Artificial Intelligence, Neural Networks, and Genetic Algorithms II
- Iqbal Gondal
, Muhammad Shoaib B. Sehgal, Mudasser Iqbal, Joarder Kamruzzaman
:
Ambient Cardiac Expert: A Cardiac Patient Monitoring System using Genetic and Clinical Knowledge Fusion. 496-501 - Ru Nie, Jianhua Yue
:
An Attribute Reduction Method Based on Rough Set and SVM and with Application in Oil-Gas Prediction. 502-506 - Chinnu Subramaniam, Jiyuan An, Jayavardhana Gubbi, Yi-Ping Phoebe Chen
:
Finding Motifs in miRNA Sequences. 507-512 - Ickjai Lee
, Kyungmi Lee:
Higher Order Voronoi Diagrams for Concept Boundaries and Tessellations. 513-518 - S. M. Kamrul Hasan, Ruhul A. Sarker
, David Cornforth:
Hybrid Genetic Algorithm for Solving Job-Shop Scheduling Problem. 519-524 - Ramesh Ram, Madhu Chetty
:
Learning Structure of a Gene Regulatory Network. 525-531
Data Mining, Data Warehousing, and Database
- A. B. M. Shawkat Ali, Tony Dobele:
A Novel Classifier Selection Approach for Adaptive Boosting Algorithms. 532-536 - Helyane Bronoski Borges
, Júlio C. Nievola:
Gene-finding as an Attribute Selection Task. 537-542 - Yu-lung Lo, Chun-Hsiung Wang:
Hybrid Multi-Feature Indexing for Music Data Retrieval. 543-548 - M. H. Peyravi, P. Khosraviyan Dehkordi, Z. Davari Nejad:
Obtain Weather Data with Data Warehousing. 549-554 - Bryon K. Ehlmann:
ORN Additive: Shrinking the Gap between Database Modeling and Implementation. 555-560 - Hu Wang, Chunqiang Gong, Yan Li
:
Service-mining Based on the Knowledge and Customer Databases. 561-568
Communication Systems, Networks, and Wireless Networks I
- Li Yi, Ji Hong:
A New Cooperative Communication MAC Strategy for Wireless Ad Hoc Networks. 569-574 - Jun Han, Zhaohao Sun
, Jinpeng Huai, Xian Li:
An Efficient Node Partitioning Algorithm for the Capacitated Minimum Spanning Tree Problem. 575-580 - Iqbal Gondal
, Mudasser Iqbal, Megan Woods, Muhammad Shoaib B. Sehgal:
Integrated Sensing and Diagnosis -- The next step in Real Time Patient Health Care. 581-586 - Abolfazl Toroghi Haghighat, Mostafa Esmaeili, Amin Saremi, V. R. Mousavi:
Intrusion Detection via Fuzzy-Genetic Algorithm Combination with Evolutionary Algorithms. 587-591 - Shui Yu
, Zhongwen Li:
Massive Data Delivery in Unstructured Peer-to-Peer Networks with Network Coding. 592-597 - Himanshu Agrawal, Melanie Grah, Mark A. Gregory
:
Optimization of QoS Routing. 598-603
Parallel and Distributed Computing and Systems
- Fadi N. Sibai
:
3D Graphics Performance Scaling and Workload Decomposition and Analysis. 604-609 - Hu Zhang, Weiguo Wu, Xiaoshe Dong
, Depei Qian, Luogeng Dai:
A Study on Data Placement of Extensible Parallel Storage System. 610-615 - John Casey, Ashley Chonka, Wanlei Zhou
:
Adjacency Cache: Fast Web Cache Indexing and Lookup. 616-621 - Maryam Amiripour, Hamid Abachi:
Average Routing Distance Analysis and Comparison of Master-Slave Super-Super-Hypercube 4-Cube Topology with different Message Passing Architectures. 622-626 - Yang Sun, Teng-Tiow Tay:
Improving Interactive Experience of Thin Client Computing by Reducing Data Spikes. 627-632 - Thuy T. Le:
Approximate Element Computational Time for Domain Decomposition in Parallel Finite Element Code. 633-639
Middleware Architectures and Techniques I
- Yantao Guo, Aijun Wen, Zengji Liu, Zhiqing Zhang:
A Novel Differentiated Service Hybrid Signaling Protocol for Optical Burst Switching Networks. 640-645 - Sunam Pradhan, Arkady B. Zaslavsky:
A Smart Proxy for a Next Generation Web Services Transaction. 646-651 - Lau Cheuk Lung, Joni da Silva Fraga:
Adapting the FT-CORBA Replication Management Service for Large-scale Distributed Systems. 652-657 - Cong-Kha Pham
, Koutaro Yamano:
An Edge Extraction Method for Color Image Using Multiple-Valued LoG Filter and Color Space. 658-662 - Leila Ismail
:
Evaluation of Authentication Mechanisms for Mobile Agents on top of Java. 663-668 - Wei Dai, Jonathan J. Liu:
Intelligent Adaptive Services for On-demand Systems Integration. 669-675
Communication Systems, Networks, and Wireless Networks II
- Iftekhar Ahmad
, Joarder Kamruzzaman
, Daryoush Habibi
:
Rerouting Technique for Faster Restoration of Preempted Calls. 676-681 - Atef Z. Ghalwash, Aliaa A. A. Youssif
, Sherif M. Hashad, Robin Doss
:
Self Adjusted Security Architecture for Mobile Ad Hoc Networks (MANETs). 682-687 - Seungyeon You, Sungchun Kim:
The Virtual Topology Reconfiguration Controller for WDM Networks. 688-693 - Klangjai Sithitavorn, Campbell Wilson, Bin Qiu:
Towards Multicast Delay Analysis for Ad hoc Wireless Networks. 694-699 - Lin Zou, Zhongwei Zhang:
A Comparative Study on the Performance of Wireless Sensor Networks. 700-705 - Ming Li:
Cross-layer Resource Control to Improve TCP Performance over Wireless Network. 706-711
Information Management Systems, Economic and Financial Systems, Control and Intelligent Systems
- Ashley M. Aitken:
Managing Unstructured and Semi-Structured Information in Organisations. 712-717 - Chen-Yang Cheng, Vittal Prabhu:
Performance Modeling of Business Processes Enabled by RFID and Web Services. 718-723 - Les R. Foulds, Mohammed Quaddus, Martin West:
Structural Equation Modelling of Large-scale Information System Application Development Productivity: the Hong Kong Experience. 724-731 - Jirawute Choungsirakulwit, Daricha Sutivong:
Portfolio Management of Option-Based Investment in Technology Research and Development. 732-737 - Adriano Cavalcanti, Bijan Shirinzadeh, Declan G. Murphy
, Julian Smith
:
Nanorobots for Laparoscopic Cancer Surgery. 738-743 - Gwo-Ruey Yu:
Robust-Optimal Control of a Nonlinear Two Degree-of-Freedom Helicopter. 744-749 - Manoranjan Paul
, Golam Sorwar:
Encoding and Decoding Techniques for Medical Video Signal Transmission and Viewing. 750-756
Internet Technology and Applications, e-Commerce
- Md. Rafiqul Islam, Wanlei Zhou
, Morshed U. Chowdhury
:
Dynamic Feature Selection for Spam Filtering Using Support Vector Machine. 757-762 - Daewook Lee, Joonho Kwon, SeungHoon Yang, Sukho Lee:
Improvement of the Recall and the Precision for Semantic Web Services Search. 763-768 - Roula Michaelides, Dennis F. Kehoe:
Internet Communities and Open innovation: an Information System Design Methodology. 769-775 - Soon-Keow Chong, Jemal H. Abawajy, Robert A. Dew:
A Multilevel Trust Management Framework. 776-781 - Qiong Ren, Yi Mu, Willy Susilo
:
SEFAP: An Email System for Anti-Phishing. 782-787 - Wenying Feng, Hua Chen:
A Matrix Algorithm forWeb Cache Pre-fetching. 788-794
Visual and Multimedia Computing
- Atul Sajjanhar, Guojun Lu
, Dengsheng Zhang
, Wanlei Zhou
:
A Composite Descriptor for Shape Retrieval. 795-800 - Dengsheng Zhang
, Melissa Chen Yi Lim:
An Efficient and Robust Technique for Region Based Shape Representation and Retrieval. 801-806 - Rakib Ahmed, Gour C. Karmakar, Laurence S. Dooley:
Efficient Probabilistic Spatio-Temporal Video Object Segmentation. 807-811 - Siddhivinayak Kulkarni:
Image Retrieval Based on Fuzzy Mapping of Image Database and Fuzzy Similarity Distance. 812-817 - Mohan Ponnada, Nalin K. Sharda:
Model of a Semantic Web Search Engine for Multimedia Content Retrieval. 818-823 - Wenxiong Kang, Feiqi Deng
:
Research on Intelligent Visual Surveillance for Public Security. 824-829
1st IEEE/ACIS International Workshop on e-Activity I
- Eun Seok Jeong, Chul Sur, Kyung Hyune Rhee:
A New DRM System Based on Graded Contents Sharing and Time-Block Distribution for Home Networks. 830-833 - Yonghee You, Mee Young Sung, Kyungkoo Jun:
An Integrated Haptic Data Transmission in Haptic Collaborative Virtual Environments. 834-839 - Tomoya Kobayashi, Kazushi Nishimoto:
Analysis of relations between spoken utterances and text messages in chat-augmented meetings. 840-843 - Jizhong Zhao, Min Xi, Yong Qi:
Cache Predicting Algorithm Based on Context-Aware in Pervasive Computing. 844-849 - Takayuki Fujimoto
, Tokuro Matsuo:
A Campus Information Processing based on Educational Resources Reuse and Integration. 850-855 - Gang Chen, Ruimin Shen, Jiajun Wang, Zeyu Chen:
Collaborative Education Model and Its Application in E-learning. 856-860
Software Architectures and Frameworks, Software Reuse and Software Testing
- Jayamsakthi Shanmugam, M. Ponnavaikko:
A solution to block Cross Site Scripting Vulnerabilities based on Service Oriented Architecture. 861-866 - Zhikun Zhao, Wei Li:
Dynamic Reconfiguration Planning with Influence Control. 867-872 - Raymond Wu:
Validation process and component analysis in semantic mediation. 873-878 - Gongzhu Hu, Ivan Milenkovic:
Collaborative File Editor Using Repository in a Box. 879-884 - Dae Wan Cho, Hyeon Soo Kim, Seunguk Oh:
A new approach to detecting memory access errors in C programs. 885-890 - Weiqun Zheng, Gary A. Bundell:
Model-Based Software Component Testing: A UML-Based Approach. 891-899
Parallel and Distributed Computing, Visual and Multimedia Computing
- Xuemei Zhao, Karl Sammut
, Fangpo He
, Shaowen Qin
:
Split Private and Shared L2 Cache Architecture for Snooping-based CMP. 900-905 - Oluwafemi O. Ajayi, Richard O. Sinnott
, Anthony Stell:
Trust Realisation in Multi-domain Collaborative Environments. 906-911 - Dawei Jia, Kathy Blashki, Penelope Goward, R. T. Jim Eales:
Investigating the Shared Visual Context in Distributed Collaborative Work. 912-917 - Samar Zutshi, Campbell Wilson, Bala Srinivasan:
Reduct-Based Result Set Fusion for Relevance Feedback in CBIR. 918-923 - Wei Zhou, Zengfu Wang:
Speech Animation Based on Chinese Mandarin Triphone Model. 924-929 - Gunwoo Kim, Yan Wang, Hyewon Seo:
Motion Control of a Dancing Character with Music. 930-936
1st IEEE/ACIS International Workshop on e-Activity II
- Hyunja Lee, Junho Shim
:
Conceptual Modeling of Product Information in e-Commerce. 937-942 - Tokuro Matsuo, Takayuki Fujimoto
:
A New Cooperative Communication System in Distance Education. 943-948 - Jun Han, Xudong Liu, Jinpeng Huai, Xuelian Lin, Xiaoxuan Ma, Xian Li:
InfoXP: An E-government Information eXchange Platform Based on Overlay Network. 949-954 - Tae-Hum Lim, Sang-Uk Shin:
Intelligent Access Control Mechanism for Ubiquitous Applications. 955-960 - Yang Sun, Teng-Tiow Tay:
Long Distance Redundancy Reduction in Thin Client Computing. 961-966 - Sajad Shirali-Shahreza, Mohammad Shirali-Shahreza, Ali Movaghar
:
Restricted Access to Exam Grades on the Web by HIP. 967-971
Data Mining, Knowledge Discovery, Neural Networks and Genetic Algorithms
- A. B. M. Shawkat Ali, Yang Xiang
:
Spam Classification Using Adaptive Boosting Algorithm. 972-976 - Shangping Dai, Li Gao, Qiang Zhu, Changwu Zhu:
A Novel Genetic Algorithm Based on Image Databases for Mining Association Rules. 977-980 - Wei Xie, Musa A. Mammadov, John Yearwood:
Using Links to Aid Web Classification. 981-986 - Sol Hart, John Yearwood, Adil M. Bagirov
:
Visual Tools for Analysing Evolution, Emergence, and Error in Data Streams. 987-992 - Suriya Kaewarsa, Kitti Attakitmongcol, Thanatchai Kulworawanichpong:
Recognition of Power Quality Events by Using Multiwavelet-Based Neural Network. 993-998 - Nazar M. Zaki
, Safaai Deris, Saleh Alwahaishi
:
SubSS: A Protein-Protein Interaction Detection Tool. 999-1004 - ChunZhi Xie, Liangzhong Yi, Yajun Du, Zheng Pei:
The Research of Social Navigation based on Fuzzy Concept Lattice. 1005-1011
Programming Languages, Technology Education, and Training
- Kostadin Kratchanov, Tzanko Golemanov, Emilia Golemanova:
Control Network Programming. 1012-1018 - Stephen Drape, Anirban Majumdar, Clark D. Thomborson
:
Slicing Aided Design of Obfuscating Transforms. 1019-1024 - Faisal Sana, Shakeel Ahmed Khoja
:
A Low Cost Interactive Distance Learning Solution. 1025-1029 - Huiming Yu, Xiaohong Yuan, Jinsheng Xu, Stephen Providence
, Bill Chu, Dechang Gu:
Bridge Information Assurance Education Gap between the Majority and Minority Universities through Collaboration. 1030-1035 - Bei-tseng Chu, Gail-Joon Ahn
, Steven Blanchard, James Deese, Richard Kelly, Huiming Yu, Ashika Young:
Collegiate Cyber Game Design Criteria and Participation. 1036-1041 - Grace W. Rumantir:
Information Technology Project Management Curriculum Practice. 1042-1048
1st IEEE/ACIS International Workshop on e-Activity III
- B. Srikanth, D. Kirubakaran, N. Siddharth, Sudip Sanyal:
Software Installation on a Huge Heterogeneous Network using Mobile Agents. 1049-1052 - Heung Seok Chae, Tae Yeon Kim, Woo-Sung Jung, Joon-Sang Lee:
Using Metrics for Estimating Maintainability of Web Applications: An Empirical Study. 1053-1059
Software Metrics, Process Management, and Improvement
- Komsan Srivisut
, Pornsiri Muenchaisri:
Bad-Smell Metrics for Aspect-Oriented Software. 1060-1065 - Sean Thompson, Torab Torabi, Purva Joshi:
A Framework to Detect Deviations During Process Enactment. 1066-1073 - Jeewani Anupama Ginige, Athula Ginige
:
Challenges and Solutions in Process Automation in Tertiary Education Institutes: An Australian Case Study. 1074-1079 - Jeewani Anupama Ginige, Athula Ginige
, Uma Sirinivasan:
CAD model of Process Elements: Towards Effective Management of Process Evolution in Web-based Workflows. 1080-1086
Speech Processing and Healthcare Engineering
- Yousof Erfani, Mohammad Shahram Moin
, Mehdi Parviz
:
New Methods for Transparent and Accurate Echo Hiding By Using the Original Audio Cepstral Content. 1087-1092 - Cheng-Hsiung Hsieh, Ting-Yu Feng, Ren-Hsien Huang:
Voice Activity Detection Based on GM(1, 1) Model. 1093-1098 - Christopher J. Page, Syed Mahfuzul Aziz
:
Automated Speech Discrimination using Frequency Derivative Threshold Detection. 1099-1103 - Abdul Hafeez-Baig
, Shelly Grist, Raj Gururajan:
Technology Management, Data management, Improved outcomes, Efficiency and Software limitation influencing the use of wireless technology for healthcare in Pakistan. 1104-1110
Middleware Architectures and Techniques, Internet Technology and Applications
- Xinfeng Ye:
Providing Reliable Web Services through Active Replication. 1111-1116 - Alex Ng
:
Towards a Table Driven XML QoS Aware Transmission Framework. 1117-1123 - Alauddin Ahmed
, Atiqur Rahman, Mohammed Anwer, Nazmul Haque, Morshed U. Chowdhury
:
Two Logical Verification of Quantum NOT Gate. 1124-1128 - Omar Khadeer Hussain
, Elizabeth Chang
, Farookh Khadeer Hussain, Tharam S. Dillon:
Determining the Loss of Investment Probability for Risk based Decision Support System. 1129-1134 - Wen-Shan Lin
, Ming-Fong Chen, Yan-Yan Chen:
Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search. 1135-1140

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.